Age | Commit message (Collapse) | Author | Files | Lines |
|
Fix issue 50
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
|
|
Signed-off-by: Nicholas Ngai <nicholas@ngai.me>
|
|
Signed-off-by: Nicholas Ngai <nicholas@ngai.me>
|
|
Signed-off-by: Nicholas Ngai <nicholas@ngai.me>
|
|
Signed-off-by: Nicholas Ngai <nicholas@ngai.me>
|
|
resolv: fix IPv6 resolution on Darwin
See merge request slirp/libslirp!104
|
|
QEMU has an issue open
(https://gitlab.com/qemu-project/qemu/-/issues/347) to forward a Unix
domain socket to guest TCP port. Both of these protocols support stream
modes of operation (and user-mode networking can only access the stream
anyway), so this patch enables Unix-to-TCP hostfwds.
Like with localhost hostfwds, the sotranslate_accept function will
translate a Unix domain socket connection to a TCP connection
originating from vhost_addr and a randomized ephemeral port.
Signed-off-by: Nicholas Ngai <nicholas@ngai.me>
|
|
res_sockaddr_union() has a field for IPv4 and a field for IPv6. When we
used `&servers[i].sin.sin_addr`, it does not return the right address
for IPv6.
|
|
On NetBSD, the sockaddr size passed to getnameinfo must match the
family.
(reworked from the patch suggestion from Yorick Hardy)
Fixes #52
|
|
Initialize sin6_scope_id to zero
See merge request slirp/libslirp!102
|
|
sin6_scope_id is not explicitly set to zero in tcp_input() which should be OK
for global IPv6 addresses, but seems to fail on Mac OS: if sin6_scope_id ends up
with a value other than zero for global addresses, connect() will fail with "No
route to host".
Tested on Mac OS v11.5.2 but might be an issue on other versions as well.
Signed-off-by: Saar Gross <saar@fb.com>
Signed-off-by: Mohan Kumar Kumar <mohankm@fb.com>
|
|
We do not need the socket to be exposed outside the localhost, and this
reduces the attack surface.
Suggested-by: Akihiro Suda <suda.kyoto@gmail.com>
|
|
resolv: fix memory leak when using libresolv
See merge request slirp/libslirp!100
|
|
|
|
Haiku: proper path to resolv.conf for DNS server
See merge request slirp/libslirp!99
|
|
|
|
Fix for Haiku
See merge request slirp/libslirp!98
|
|
|
|
dhcp: Always send DHCP_OPT_LEN bytes in options
Closes #51
See merge request slirp/libslirp!97
|
|
RFC2131 suggests that the options field may be at least 312 bytes.
Some DHCP clients seem to assume that it has to be at least 312 bytes.
Fixes #51
Fixes: f13cad45b25d92760bb0ad67bec0300a4d7d5275 ("bootp: limit
vendor-specific area to input packet memory buffer")
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
|
|
Release v4.6.1
See merge request slirp/libslirp!96
|
|
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
Fix "DHCP broken in libslirp v4.6.0"
Closes #48
See merge request slirp/libslirp!95
|
|
Fix issue 48
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
|
|
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
Release v4.6.0
See merge request slirp/libslirp!94
|
|
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
See merge request slirp/libslirp-private!1
|
|
Fixes: CVE-2021-3594
Fixes: https://gitlab.freedesktop.org/slirp/libslirp/-/issues/47
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
Instead of using a composed structure and potentially reading past the
incoming buffer, use a different structure for the header.
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
Fixes: CVE-2021-3595
Fixes: https://gitlab.freedesktop.org/slirp/libslirp/-/issues/46
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
Fixes: CVE-2021-3593
Fixes: https://gitlab.freedesktop.org/slirp/libslirp/-/issues/45
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
Fixes: CVE-2021-3592
Fixes: https://gitlab.freedesktop.org/slirp/libslirp/-/issues/44
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
sizeof(bootp_t) currently holds DHCP_OPT_LEN. Remove this optional field
from the structure, to help with the following patch checking for
minimal header size. Modify the bootp_reply() function to take the
buffer boundaries and avoiding potential buffer overflow.
Related to CVE-2021-3592.
https://gitlab.freedesktop.org/slirp/libslirp/-/issues/44
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
Recent security issues demonstrate the lack of safety care when casting
a mbuf to a particular structure type. At least, it should check that
the buffer is large enough. The following patches will make use of this
function.
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
Revert "Set macOS deployment target to macOS 10.4"
See merge request slirp/libslirp!93
|
|
This reverts commit
410e296a52fb274648f8ecf53561eaab4b33c52c (slirp/libslirp!72), as it
causes extra compilation warnings when linking with libraries using a
different version.
Instead, the builder can set CFLAGS manually.
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
This is a simple working example.
Fixes #30
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
|
|
This allows pings provided that the process is running as root (or has some
capability to create raw sockets).
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
|
|
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
|
|
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
|
|
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
|
|
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
|
|
mbuf: Add debugging helpers for allocation
See merge request slirp/libslirp!90
|
|
This adds a few helpers for debugging mbuf allocations when running in
debugging mode (lsan, valgrind, etc.)
- We do not want to cache allocations, so always set M_DOFREE to prevent
us from putting any mbuf in it.
- We want to update the mbuf allocation owner on function call for more
precise leak reporting.
Based on Jeremy Marchand's fuzzing work.
Signed-off-by: jeremy marchand <jeremy.marchand@etu.u-bordeaux.fr>
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
|
|
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
|
|
ncsi: make ncsi_calculate_checksum work with unaligned data
Closes #43
See merge request slirp/libslirp!89
|
|
Fixes #43
|
|
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
|